[libvirt] [PATCH] virnwfilterbindingobj: Introduce and use virNWFilterBindingObjStealDef

Michal Privoznik posted 1 patch 4 weeks ago
Test syntax-check passed
Patches applied successfully (tree, apply log)
git fetch https://github.com/patchew-project/libvirt tags/patchew/d5a560b736a5bd6621223828c69ee157f6ee3235.1553077864.git.mprivozn@redhat.com
src/conf/virnwfilterbindingobj.c     | 10 ++++++++++
src/conf/virnwfilterbindingobj.h     |  3 +++
src/conf/virnwfilterbindingobjlist.c |  4 ++++
src/libvirt_private.syms             |  1 +
4 files changed, 18 insertions(+)

[libvirt] [PATCH] virnwfilterbindingobj: Introduce and use virNWFilterBindingObjStealDef

Posted by Michal Privoznik 4 weeks ago
https://bugzilla.redhat.com/show_bug.cgi?id=1686927

When trying to create a nwfilter binding via
nwfilterBindingCreateXML() we may encounter a crash. The sequence
of functions called is as follows:

1) nwfilterBindingCreateXML() parses the XML and calls
virNWFilterBindingObjListAdd() which calls
virNWFilterBindingObjListAddLocked()

2) Here, @binding is not found because binding->remove is set.

3) Therefore, controls continue with creating new @binding,
setting its def to the one from 1) and adding it to the hash
table.

4) This fails, because the binding is still in the hash table
(duplicate key is detected).

5) The control jumps to 'error' label where
virNWFilterBindingObjEndAPI() is called which frees the binding
definition passed.

6) Error is propagated to the caller, which calls
virNWFilterBindingDefFree() over the definition again.

The solution is to unset binding->def in case of failure so it's
not freed in step 5).

Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
---

Technically, this is a v2 of:

https://www.redhat.com/archives/libvir-list/2019-March/msg01209.html

But since this one implements different approach than v1 I'm not marking
it as such.

 src/conf/virnwfilterbindingobj.c     | 10 ++++++++++
 src/conf/virnwfilterbindingobj.h     |  3 +++
 src/conf/virnwfilterbindingobjlist.c |  4 ++++
 src/libvirt_private.syms             |  1 +
 4 files changed, 18 insertions(+)

diff --git a/src/conf/virnwfilterbindingobj.c b/src/conf/virnwfilterbindingobj.c
index 23978d4207..68afb9c434 100644
--- a/src/conf/virnwfilterbindingobj.c
+++ b/src/conf/virnwfilterbindingobj.c
@@ -88,6 +88,16 @@ virNWFilterBindingObjSetDef(virNWFilterBindingObjPtr obj,
 }
 
 
+virNWFilterBindingDefPtr
+virNWFilterBindingObjStealDef(virNWFilterBindingObjPtr obj)
+{
+    virNWFilterBindingDefPtr def;
+
+    VIR_STEAL_PTR(def, obj->def);
+    return def;
+}
+
+
 bool
 virNWFilterBindingObjGetRemoving(virNWFilterBindingObjPtr obj)
 {
diff --git a/src/conf/virnwfilterbindingobj.h b/src/conf/virnwfilterbindingobj.h
index 8e5fbee35f..b26bb3c8ec 100644
--- a/src/conf/virnwfilterbindingobj.h
+++ b/src/conf/virnwfilterbindingobj.h
@@ -39,6 +39,9 @@ void
 virNWFilterBindingObjSetDef(virNWFilterBindingObjPtr obj,
                             virNWFilterBindingDefPtr def);
 
+virNWFilterBindingDefPtr
+virNWFilterBindingObjStealDef(virNWFilterBindingObjPtr obj);
+
 bool
 virNWFilterBindingObjGetRemoving(virNWFilterBindingObjPtr obj);
 
diff --git a/src/conf/virnwfilterbindingobjlist.c b/src/conf/virnwfilterbindingobjlist.c
index 06ccbf53af..4ee2c1b194 100644
--- a/src/conf/virnwfilterbindingobjlist.c
+++ b/src/conf/virnwfilterbindingobjlist.c
@@ -167,6 +167,7 @@ virNWFilterBindingObjListAddLocked(virNWFilterBindingObjListPtr bindings,
                                    virNWFilterBindingDefPtr def)
 {
     virNWFilterBindingObjPtr binding;
+    bool stealDef = false;
 
     /* See if a binding with matching portdev already exists */
     if ((binding = virNWFilterBindingObjListFindByPortDevLocked(
@@ -181,6 +182,7 @@ virNWFilterBindingObjListAddLocked(virNWFilterBindingObjListPtr bindings,
         goto error;
 
     virNWFilterBindingObjSetDef(binding, def);
+    stealDef = true;
 
     if (virNWFilterBindingObjListAddObjLocked(bindings, binding) < 0)
         goto error;
@@ -188,6 +190,8 @@ virNWFilterBindingObjListAddLocked(virNWFilterBindingObjListPtr bindings,
     return binding;
 
  error:
+    if (stealDef)
+        virNWFilterBindingObjStealDef(binding);
     virNWFilterBindingObjEndAPI(&binding);
     return NULL;
 }
diff --git a/src/libvirt_private.syms b/src/libvirt_private.syms
index 26f10bd47f..a33f9e61b1 100644
--- a/src/libvirt_private.syms
+++ b/src/libvirt_private.syms
@@ -1101,6 +1101,7 @@ virNWFilterBindingObjParseFile;
 virNWFilterBindingObjSave;
 virNWFilterBindingObjSetDef;
 virNWFilterBindingObjSetRemoving;
+virNWFilterBindingObjStealDef;
 
 
 # conf/virnwfilterbindingobjlist.h
-- 
2.19.2

--
libvir-list mailing list
libvir-list@redhat.com
https://www.redhat.com/mailman/listinfo/libvir-list

Re: [libvirt] [PATCH] virnwfilterbindingobj: Introduce and use virNWFilterBindingObjStealDef

Posted by Ján Tomko 4 weeks ago
On Wed, Mar 20, 2019 at 11:31:57AM +0100, Michal Privoznik wrote:
>https://bugzilla.redhat.com/show_bug.cgi?id=1686927
>
>When trying to create a nwfilter binding via
>nwfilterBindingCreateXML() we may encounter a crash. The sequence
>of functions called is as follows:
>
>1) nwfilterBindingCreateXML() parses the XML and calls
>virNWFilterBindingObjListAdd() which calls
>virNWFilterBindingObjListAddLocked()
>
>2) Here, @binding is not found because binding->remove is set.
>
>3) Therefore, controls continue with creating new @binding,
>setting its def to the one from 1) and adding it to the hash
>table.
>
>4) This fails, because the binding is still in the hash table
>(duplicate key is detected).
>
>5) The control jumps to 'error' label where
>virNWFilterBindingObjEndAPI() is called which frees the binding
>definition passed.
>
>6) Error is propagated to the caller, which calls
>virNWFilterBindingDefFree() over the definition again.
>
>The solution is to unset binding->def in case of failure so it's
>not freed in step 5).
>
>Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
>---
>
>Technically, this is a v2 of:
>
>https://www.redhat.com/archives/libvir-list/2019-March/msg01209.html
>
>But since this one implements different approach than v1 I'm not marking
>it as such.
>
> src/conf/virnwfilterbindingobj.c     | 10 ++++++++++
> src/conf/virnwfilterbindingobj.h     |  3 +++
> src/conf/virnwfilterbindingobjlist.c |  4 ++++
> src/libvirt_private.syms             |  1 +
> 4 files changed, 18 insertions(+)
>

Reviewed-by: Ján Tomko <jtomko@redhat.com>

Jano
--
libvir-list mailing list
libvir-list@redhat.com
https://www.redhat.com/mailman/listinfo/libvir-list

Re: [libvirt] [PATCH] virnwfilterbindingobj: Introduce and use virNWFilterBindingObjStealDef

Posted by John Ferlan 4 weeks ago

On 3/20/19 6:31 AM, Michal Privoznik wrote:
> https://bugzilla.redhat.com/show_bug.cgi?id=1686927
> 
> When trying to create a nwfilter binding via
> nwfilterBindingCreateXML() we may encounter a crash. The sequence
> of functions called is as follows:
> 
> 1) nwfilterBindingCreateXML() parses the XML and calls
> virNWFilterBindingObjListAdd() which calls
> virNWFilterBindingObjListAddLocked()
> 
> 2) Here, @binding is not found because binding->remove is set.
> 
> 3) Therefore, controls continue with creating new @binding,
> setting its def to the one from 1) and adding it to the hash
> table.
> 
> 4) This fails, because the binding is still in the hash table
> (duplicate key is detected).
> 
> 5) The control jumps to 'error' label where
> virNWFilterBindingObjEndAPI() is called which frees the binding
> definition passed.
> 
> 6) Error is propagated to the caller, which calls
> virNWFilterBindingDefFree() over the definition again.
> 
> The solution is to unset binding->def in case of failure so it's
> not freed in step 5).
> 
> Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
> ---
> 
> Technically, this is a v2 of:
> 
> https://www.redhat.com/archives/libvir-list/2019-March/msg01209.html
> 
> But since this one implements different approach than v1 I'm not marking
> it as such.
> 
>  src/conf/virnwfilterbindingobj.c     | 10 ++++++++++
>  src/conf/virnwfilterbindingobj.h     |  3 +++
>  src/conf/virnwfilterbindingobjlist.c |  4 ++++
>  src/libvirt_private.syms             |  1 +
>  4 files changed, 18 insertions(+)
> 

Why wouldn't your other series take care of this in a more efficient
way?, e.g. patch 3/3:

https://www.redhat.com/archives/libvir-list/2019-March/msg01321.html

Isn't the problem that we can get to the virNWFilterBindingObjSetDef and
virNWFilterBindingObjListAddObjLocked because of the same portdevname
key name which causes the virHashAddEntry to fail.

If we fail after virNWFilterBindingObjListFindByPortDevLocked because
the other patch recognized that the @binding was in the process of being
removed, then we'd never create a new @obj with our new @def that had
the duplicated portdevname key.


> diff --git a/src/conf/virnwfilterbindingobj.c b/src/conf/virnwfilterbindingobj.c
> index 23978d4207..68afb9c434 100644
> --- a/src/conf/virnwfilterbindingobj.c
> +++ b/src/conf/virnwfilterbindingobj.c
> @@ -88,6 +88,16 @@ virNWFilterBindingObjSetDef(virNWFilterBindingObjPtr obj,
>  }
>  
>  
> +virNWFilterBindingDefPtr
> +virNWFilterBindingObjStealDef(virNWFilterBindingObjPtr obj)
> +{
> +    virNWFilterBindingDefPtr def;
> +
> +    VIR_STEAL_PTR(def, obj->def);
> +    return def;
> +}
> +
> +
>  bool
>  virNWFilterBindingObjGetRemoving(virNWFilterBindingObjPtr obj)
>  {
> diff --git a/src/conf/virnwfilterbindingobj.h b/src/conf/virnwfilterbindingobj.h
> index 8e5fbee35f..b26bb3c8ec 100644
> --- a/src/conf/virnwfilterbindingobj.h
> +++ b/src/conf/virnwfilterbindingobj.h
> @@ -39,6 +39,9 @@ void
>  virNWFilterBindingObjSetDef(virNWFilterBindingObjPtr obj,
>                              virNWFilterBindingDefPtr def);
>  
> +virNWFilterBindingDefPtr
> +virNWFilterBindingObjStealDef(virNWFilterBindingObjPtr obj);
> +
>  bool
>  virNWFilterBindingObjGetRemoving(virNWFilterBindingObjPtr obj);
>  
> diff --git a/src/conf/virnwfilterbindingobjlist.c b/src/conf/virnwfilterbindingobjlist.c
> index 06ccbf53af..4ee2c1b194 100644
> --- a/src/conf/virnwfilterbindingobjlist.c
> +++ b/src/conf/virnwfilterbindingobjlist.c
> @@ -167,6 +167,7 @@ virNWFilterBindingObjListAddLocked(virNWFilterBindingObjListPtr bindings,
>                                     virNWFilterBindingDefPtr def)
>  {
>      virNWFilterBindingObjPtr binding;
> +    bool stealDef = false;
>  
>      /* See if a binding with matching portdev already exists */
>      if ((binding = virNWFilterBindingObjListFindByPortDevLocked(
> @@ -181,6 +182,7 @@ virNWFilterBindingObjListAddLocked(virNWFilterBindingObjListPtr bindings,
>          goto error;
>  
>      virNWFilterBindingObjSetDef(binding, def);
> +    stealDef = true;
>  
>      if (virNWFilterBindingObjListAddObjLocked(bindings, binding) < 0)
>          goto error;
> @@ -188,6 +190,8 @@ virNWFilterBindingObjListAddLocked(virNWFilterBindingObjListPtr bindings,
>      return binding;
>  
>   error:
> +    if (stealDef)
> +        virNWFilterBindingObjStealDef(binding);

I think this is no different than modifying the failure path for
virNWFilterBindingObjListAddObjLocked to clear out @def acknowledging
our caller would free @def upon failure return.

   if !AddObj() {
      ObjSet(binding, NULL)
      goto error
   }

Alternatively, reorder the code to do the ObjSetDef after successful
return from virNWFilterBindingObjListAddLocked which would take
def->portdevname as a "const char *key" type parameter; however, there
could be some affect with virNWFilterBindingObjListLoadStatus
processing. In particular how virNWFilterBindingObjParseXML sets obj->def...

BTW: When I read the create a StealDef I was thinking more in the terms
of "if binding is in the process of being removed", then use the
StealDef to return the current @binding->def so it could be Free'd and
clear the removing bit. There may need to be some obj ref counting magic
to make sure some other thread in the process of deleting the object
doesn't do something bad or logic in that thread to recognize the @obj
is no longer being deleted. I didn't dig into the removing code and
there's not enough coffee in me yet to think more clearly about that.

John

>      virNWFilterBindingObjEndAPI(&binding);
>      return NULL;
>  }
> diff --git a/src/libvirt_private.syms b/src/libvirt_private.syms
> index 26f10bd47f..a33f9e61b1 100644
> --- a/src/libvirt_private.syms
> +++ b/src/libvirt_private.syms
> @@ -1101,6 +1101,7 @@ virNWFilterBindingObjParseFile;
>  virNWFilterBindingObjSave;
>  virNWFilterBindingObjSetDef;
>  virNWFilterBindingObjSetRemoving;
> +virNWFilterBindingObjStealDef;
>  
>  
>  # conf/virnwfilterbindingobjlist.h
> 

--
libvir-list mailing list
libvir-list@redhat.com
https://www.redhat.com/mailman/listinfo/libvir-list

Re: [libvirt] [PATCH] virnwfilterbindingobj: Introduce and use virNWFilterBindingObjStealDef

Posted by Michal Privoznik 4 weeks ago
On 3/20/19 12:17 PM, John Ferlan wrote:
> 
> 
> On 3/20/19 6:31 AM, Michal Privoznik wrote:
>> https://bugzilla.redhat.com/show_bug.cgi?id=1686927
>>
>> When trying to create a nwfilter binding via
>> nwfilterBindingCreateXML() we may encounter a crash. The sequence
>> of functions called is as follows:
>>
>> 1) nwfilterBindingCreateXML() parses the XML and calls
>> virNWFilterBindingObjListAdd() which calls
>> virNWFilterBindingObjListAddLocked()
>>
>> 2) Here, @binding is not found because binding->remove is set.
>>
>> 3) Therefore, controls continue with creating new @binding,
>> setting its def to the one from 1) and adding it to the hash
>> table.
>>
>> 4) This fails, because the binding is still in the hash table
>> (duplicate key is detected).
>>
>> 5) The control jumps to 'error' label where
>> virNWFilterBindingObjEndAPI() is called which frees the binding
>> definition passed.
>>
>> 6) Error is propagated to the caller, which calls
>> virNWFilterBindingDefFree() over the definition again.
>>
>> The solution is to unset binding->def in case of failure so it's
>> not freed in step 5).
>>
>> Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
>> ---
>>
>> Technically, this is a v2 of:
>>
>> https://www.redhat.com/archives/libvir-list/2019-March/msg01209.html
>>
>> But since this one implements different approach than v1 I'm not marking
>> it as such.
>>
>>   src/conf/virnwfilterbindingobj.c     | 10 ++++++++++
>>   src/conf/virnwfilterbindingobj.h     |  3 +++
>>   src/conf/virnwfilterbindingobjlist.c |  4 ++++
>>   src/libvirt_private.syms             |  1 +
>>   4 files changed, 18 insertions(+)
>>
> 
> Why wouldn't your other series take care of this in a more efficient
> way?, e.g. patch 3/3:
> 
> https://www.redhat.com/archives/libvir-list/2019-March/msg01321.html
> 

These are separate issues really. virHashAddEntry() can fail in more 
cases than just 'Duplicate key'. For instance, on OOM. The patches you 
reference help us prevent tickling this bug in case of 'Duplicate key' 
but not really for OOM.

> Isn't the problem that we can get to the virNWFilterBindingObjSetDef and
> virNWFilterBindingObjListAddObjLocked because of the same portdevname
> key name which causes the virHashAddEntry to fail.
> 
> If we fail after virNWFilterBindingObjListFindByPortDevLocked because
> the other patch recognized that the @binding was in the process of being
> removed, then we'd never create a new @obj with our new @def that had
> the duplicated portdevname key.

Again, patch you refer to will only prevent from tickling this bug.

> 
> 
>> diff --git a/src/conf/virnwfilterbindingobj.c b/src/conf/virnwfilterbindingobj.c
>> index 23978d4207..68afb9c434 100644
>> --- a/src/conf/virnwfilterbindingobj.c
>> +++ b/src/conf/virnwfilterbindingobj.c
>> @@ -88,6 +88,16 @@ virNWFilterBindingObjSetDef(virNWFilterBindingObjPtr obj,
>>   }
>>   
>>   
>> +virNWFilterBindingDefPtr
>> +virNWFilterBindingObjStealDef(virNWFilterBindingObjPtr obj)
>> +{
>> +    virNWFilterBindingDefPtr def;
>> +
>> +    VIR_STEAL_PTR(def, obj->def);
>> +    return def;
>> +}
>> +
>> +
>>   bool
>>   virNWFilterBindingObjGetRemoving(virNWFilterBindingObjPtr obj)
>>   {
>> diff --git a/src/conf/virnwfilterbindingobj.h b/src/conf/virnwfilterbindingobj.h
>> index 8e5fbee35f..b26bb3c8ec 100644
>> --- a/src/conf/virnwfilterbindingobj.h
>> +++ b/src/conf/virnwfilterbindingobj.h
>> @@ -39,6 +39,9 @@ void
>>   virNWFilterBindingObjSetDef(virNWFilterBindingObjPtr obj,
>>                               virNWFilterBindingDefPtr def);
>>   
>> +virNWFilterBindingDefPtr
>> +virNWFilterBindingObjStealDef(virNWFilterBindingObjPtr obj);
>> +
>>   bool
>>   virNWFilterBindingObjGetRemoving(virNWFilterBindingObjPtr obj);
>>   
>> diff --git a/src/conf/virnwfilterbindingobjlist.c b/src/conf/virnwfilterbindingobjlist.c
>> index 06ccbf53af..4ee2c1b194 100644
>> --- a/src/conf/virnwfilterbindingobjlist.c
>> +++ b/src/conf/virnwfilterbindingobjlist.c
>> @@ -167,6 +167,7 @@ virNWFilterBindingObjListAddLocked(virNWFilterBindingObjListPtr bindings,
>>                                      virNWFilterBindingDefPtr def)
>>   {
>>       virNWFilterBindingObjPtr binding;
>> +    bool stealDef = false;
>>   
>>       /* See if a binding with matching portdev already exists */
>>       if ((binding = virNWFilterBindingObjListFindByPortDevLocked(
>> @@ -181,6 +182,7 @@ virNWFilterBindingObjListAddLocked(virNWFilterBindingObjListPtr bindings,
>>           goto error;
>>   
>>       virNWFilterBindingObjSetDef(binding, def);
>> +    stealDef = true;
>>   
>>       if (virNWFilterBindingObjListAddObjLocked(bindings, binding) < 0)
>>           goto error;
>> @@ -188,6 +190,8 @@ virNWFilterBindingObjListAddLocked(virNWFilterBindingObjListPtr bindings,
>>       return binding;
>>   
>>    error:
>> +    if (stealDef)
>> +        virNWFilterBindingObjStealDef(binding);
> 
> I think this is no different than modifying the failure path for
> virNWFilterBindingObjListAddObjLocked to clear out @def acknowledging
> our caller would free @def upon failure return.
> 
>     if !AddObj() {
>        ObjSet(binding, NULL)
>        goto error
>     }

As said in review for v1, virNWFilterBindingObjSetDef() calls 
virNWFilterBindingDefFree(binding->def) and only after that it sets 
binding->def to desired value. This approach won't help.

> 
> Alternatively, reorder the code to do the ObjSetDef after successful
> return from virNWFilterBindingObjListAddLocked which would take
> def->portdevname as a "const char *key" type parameter; however, there
> could be some affect with virNWFilterBindingObjListLoadStatus
> processing. In particular how virNWFilterBindingObjParseXML sets obj->def...

That's an alternative approach. There are two (or more) ways to fix this 
bug. I've chosen one of them. What advantages does the other have that 
it should be done that way?

> 
> BTW: When I read the create a StealDef I was thinking more in the terms
> of "if binding is in the process of being removed", then use the
> StealDef to return the current @binding->def so it could be Free'd and
> clear the removing bit. There may need to be some obj ref counting magic
> to make sure some other thread in the process of deleting the object
> doesn't do something bad or logic in that thread to recognize the @obj
> is no longer being deleted. I didn't dig into the removing code and
> there's not enough coffee in me yet to think more clearly about that.

In general, I don't think such logic is desired. Just look at my 
reproducer (1/3 from the linked series). One thread is doing 'destroy' 
the other is doing 'create'. There can't be any logic that would make 
both APIs happy, can it? One of the pair has to fail.

Michal

--
libvir-list mailing list
libvir-list@redhat.com
https://www.redhat.com/mailman/listinfo/libvir-list

Re: [libvirt] [PATCH] virnwfilterbindingobj: Introduce and use virNWFilterBindingObjStealDef

Posted by John Ferlan 4 weeks ago

On 3/20/19 9:11 AM, Michal Privoznik wrote:
> On 3/20/19 12:17 PM, John Ferlan wrote:
>>
>>
>> On 3/20/19 6:31 AM, Michal Privoznik wrote:
>>> https://bugzilla.redhat.com/show_bug.cgi?id=1686927
>>>
>>> When trying to create a nwfilter binding via
>>> nwfilterBindingCreateXML() we may encounter a crash. The sequence
>>> of functions called is as follows:
>>>
>>> 1) nwfilterBindingCreateXML() parses the XML and calls
>>> virNWFilterBindingObjListAdd() which calls
>>> virNWFilterBindingObjListAddLocked()
>>>
>>> 2) Here, @binding is not found because binding->remove is set.
>>>
>>> 3) Therefore, controls continue with creating new @binding,
>>> setting its def to the one from 1) and adding it to the hash
>>> table.
>>>
>>> 4) This fails, because the binding is still in the hash table
>>> (duplicate key is detected).
>>>
>>> 5) The control jumps to 'error' label where
>>> virNWFilterBindingObjEndAPI() is called which frees the binding
>>> definition passed.
>>>
>>> 6) Error is propagated to the caller, which calls
>>> virNWFilterBindingDefFree() over the definition again.
>>>
>>> The solution is to unset binding->def in case of failure so it's
>>> not freed in step 5).
>>>
>>> Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
>>> ---
>>>
>>> Technically, this is a v2 of:
>>>
>>> https://www.redhat.com/archives/libvir-list/2019-March/msg01209.html
>>>
>>> But since this one implements different approach than v1 I'm not marking
>>> it as such.
>>>
>>>   src/conf/virnwfilterbindingobj.c     | 10 ++++++++++
>>>   src/conf/virnwfilterbindingobj.h     |  3 +++
>>>   src/conf/virnwfilterbindingobjlist.c |  4 ++++
>>>   src/libvirt_private.syms             |  1 +
>>>   4 files changed, 18 insertions(+)
>>>
>>
>> Why wouldn't your other series take care of this in a more efficient
>> way?, e.g. patch 3/3:
>>
>> https://www.redhat.com/archives/libvir-list/2019-March/msg01321.html
>>
> 
> These are separate issues really. virHashAddEntry() can fail in more
> cases than just 'Duplicate key'. For instance, on OOM. The patches you
> reference help us prevent tickling this bug in case of 'Duplicate key'
> but not really for OOM.
> 

Ah... right... you could update the commit message above to indicate key
error or oom error (just for posterity)

>> Isn't the problem that we can get to the virNWFilterBindingObjSetDef and
>> virNWFilterBindingObjListAddObjLocked because of the same portdevname
>> key name which causes the virHashAddEntry to fail.
>>
>> If we fail after virNWFilterBindingObjListFindByPortDevLocked because
>> the other patch recognized that the @binding was in the process of being
>> removed, then we'd never create a new @obj with our new @def that had
>> the duplicated portdevname key.
> 
> Again, patch you refer to will only prevent from tickling this bug.
> 

Right - just trying to complete my thought.

>>
>>
>>> diff --git a/src/conf/virnwfilterbindingobj.c
>>> b/src/conf/virnwfilterbindingobj.c
>>> index 23978d4207..68afb9c434 100644
>>> --- a/src/conf/virnwfilterbindingobj.c
>>> +++ b/src/conf/virnwfilterbindingobj.c
>>> @@ -88,6 +88,16 @@
>>> virNWFilterBindingObjSetDef(virNWFilterBindingObjPtr obj,
>>>   }
>>>     +virNWFilterBindingDefPtr
>>> +virNWFilterBindingObjStealDef(virNWFilterBindingObjPtr obj)
>>> +{
>>> +    virNWFilterBindingDefPtr def;
>>> +
>>> +    VIR_STEAL_PTR(def, obj->def);
>>> +    return def;
>>> +}
>>> +
>>> +
>>>   bool
>>>   virNWFilterBindingObjGetRemoving(virNWFilterBindingObjPtr obj)
>>>   {
>>> diff --git a/src/conf/virnwfilterbindingobj.h
>>> b/src/conf/virnwfilterbindingobj.h
>>> index 8e5fbee35f..b26bb3c8ec 100644
>>> --- a/src/conf/virnwfilterbindingobj.h
>>> +++ b/src/conf/virnwfilterbindingobj.h
>>> @@ -39,6 +39,9 @@ void
>>>   virNWFilterBindingObjSetDef(virNWFilterBindingObjPtr obj,
>>>                               virNWFilterBindingDefPtr def);
>>>   +virNWFilterBindingDefPtr
>>> +virNWFilterBindingObjStealDef(virNWFilterBindingObjPtr obj);
>>> +
>>>   bool
>>>   virNWFilterBindingObjGetRemoving(virNWFilterBindingObjPtr obj);
>>>   diff --git a/src/conf/virnwfilterbindingobjlist.c
>>> b/src/conf/virnwfilterbindingobjlist.c
>>> index 06ccbf53af..4ee2c1b194 100644
>>> --- a/src/conf/virnwfilterbindingobjlist.c
>>> +++ b/src/conf/virnwfilterbindingobjlist.c
>>> @@ -167,6 +167,7 @@
>>> virNWFilterBindingObjListAddLocked(virNWFilterBindingObjListPtr
>>> bindings,
>>>                                      virNWFilterBindingDefPtr def)
>>>   {
>>>       virNWFilterBindingObjPtr binding;
>>> +    bool stealDef = false;
>>>         /* See if a binding with matching portdev already exists */
>>>       if ((binding = virNWFilterBindingObjListFindByPortDevLocked(
>>> @@ -181,6 +182,7 @@
>>> virNWFilterBindingObjListAddLocked(virNWFilterBindingObjListPtr
>>> bindings,
>>>           goto error;
>>>         virNWFilterBindingObjSetDef(binding, def);
>>> +    stealDef = true;
>>>         if (virNWFilterBindingObjListAddObjLocked(bindings, binding)
>>> < 0)
>>>           goto error;
>>> @@ -188,6 +190,8 @@
>>> virNWFilterBindingObjListAddLocked(virNWFilterBindingObjListPtr
>>> bindings,
>>>       return binding;
>>>      error:
>>> +    if (stealDef)
>>> +        virNWFilterBindingObjStealDef(binding);
>>
>> I think this is no different than modifying the failure path for
>> virNWFilterBindingObjListAddObjLocked to clear out @def acknowledging
>> our caller would free @def upon failure return.
>>
>>     if !AddObj() {
>>        ObjSet(binding, NULL)
>>        goto error
>>     }
> 
> As said in review for v1, virNWFilterBindingObjSetDef() calls
> virNWFilterBindingDefFree(binding->def) and only after that it sets
> binding->def to desired value. This approach won't help.
> 

Ah right - mind block. Trying to recall other places and the order of
when setting ->def occurs - for some reason I recall it always occurred
after the Hash insertion was successful, hence the subsequent comment of
changing order. That's more of a consistency type thing.

I'm fine with this approach and see Jano already R-By'd it. Didn't want
to leave you hanging with any unresolved questions/concerns.

John

>>
>> Alternatively, reorder the code to do the ObjSetDef after successful
>> return from virNWFilterBindingObjListAddLocked which would take
>> def->portdevname as a "const char *key" type parameter; however, there
>> could be some affect with virNWFilterBindingObjListLoadStatus
>> processing. In particular how virNWFilterBindingObjParseXML sets
>> obj->def...
> 
> That's an alternative approach. There are two (or more) ways to fix this
> bug. I've chosen one of them. What advantages does the other have that
> it should be done that way?
> 
>>
>> BTW: When I read the create a StealDef I was thinking more in the terms
>> of "if binding is in the process of being removed", then use the
>> StealDef to return the current @binding->def so it could be Free'd and
>> clear the removing bit. There may need to be some obj ref counting magic
>> to make sure some other thread in the process of deleting the object
>> doesn't do something bad or logic in that thread to recognize the @obj
>> is no longer being deleted. I didn't dig into the removing code and
>> there's not enough coffee in me yet to think more clearly about that.
> 
> In general, I don't think such logic is desired. Just look at my
> reproducer (1/3 from the linked series). One thread is doing 'destroy'
> the other is doing 'create'. There can't be any logic that would make
> both APIs happy, can it? One of the pair has to fail.
> 
> Michal

--
libvir-list mailing list
libvir-list@redhat.com
https://www.redhat.com/mailman/listinfo/libvir-list